Maktub Locker – An overview
Ransomware has unfortunately been gaining in popularity over the last year. With targets such as hospitals and schools ‘paying up’ to get their files decrypted,
Reducing ingestion charges shouldn’t mean compromising on security. Discover how to optimise log data without losing vital context and start saving immediately.
Ransomware has unfortunately been gaining in popularity over the last year. With targets such as hospitals and schools ‘paying up’ to get their files decrypted,
What is a photo vault? Security is an important issue to all of us today, and we are all realising the value of our personal
What is Cyber Defence? Cyber defence represents a multifaceted strategy encompassing network security, incident response, and safeguarding critical infrastructure. It extends its protective mantle across
The e2e-assure approach This is the third article of a three part series that provides advice to organisations looking to procure managed security monitoring, protective
This is the second article in a three-part series providing advice to organisations seeking managed security monitoring, protective monitoring (PM), and Security Operations Centre (SOC)
Managed Security Monitoring: Public Sector This is the first article in a three-part series offering guidance for organisations seeking managed monitoring services, including protective monitoring
What does BYOD mean? BYOD also known as “Bring Your Own Devices” refers to the use of personal devices for conducting work related activities. What’s
What is the Public Cloud? The public cloud is defined by Microsoft as: “A computing services offered by third-party providers over the public Internet, making
What is Incident Response? As defined by NCSC, incident response is the process organisations give to directing support when they become victims of a cyber
What is Cyber Essentials? Cyber Essentials is a government-backed initiative through NCSC that provides robust protection for organisations of all sizes against a wide array
In our latest independent research we surveyed 500 cyber risk owners and 1000 employees, to truly understand future internal threats for businesses in 2025. Read now to gain valuable insights on workforce disconnect and the threats from AI adoption.
© e2e-assure Ltd, 2025. Registered in England and Wales – Company number 08732893